Static task
static1
Behavioral task
behavioral1
Sample
c2ac1409e6d147b6689898a5f0a90748881e04ddfbf1d5bfdb780ca049f88348.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c2ac1409e6d147b6689898a5f0a90748881e04ddfbf1d5bfdb780ca049f88348.exe
Resource
win10v2004-20220812-en
General
-
Target
c2ac1409e6d147b6689898a5f0a90748881e04ddfbf1d5bfdb780ca049f88348
-
Size
28KB
-
MD5
4036d6c290316c8f065beb0a089f49df
-
SHA1
a08f95383b8a914fb957a72d94d20a68be32a587
-
SHA256
c2ac1409e6d147b6689898a5f0a90748881e04ddfbf1d5bfdb780ca049f88348
-
SHA512
7389f6e1d4ad684d106ed29a9abbee065358102a563682cddde26ff6a6adcab5680e05ffa4047750d446d9eb026148e8faf48e9718a7110e45ed641593fd503f
-
SSDEEP
384:BcX+UVieC94wwkJFUcvqWXlAJSgVJsymRZ6oI:BW+UUpisBlEaLZ6o
Malware Config
Signatures
Files
-
c2ac1409e6d147b6689898a5f0a90748881e04ddfbf1d5bfdb780ca049f88348.exe windows x86
352b4f7be5387c6472d4a4b6564a715c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
CopyFileA
GetModuleFileNameA
GetWindowsDirectoryA
ExitProcess
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
CloseHandle
SetPriorityClass
WriteProcessMemory
Sleep
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeW
user32
GetDesktopWindow
GetDC
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE